| | |
| Dec | 2019 |
Joshua Neil - Demystifying Data Science for Cyber Security |
| Dec | 2019 |
Chris Calvert - The Power of AI to Disrupt Security Operations |
| Dec | 2019 |
Christina Richmond - Security Analytics in the Cloud Era—Top 5 Industry Trends |
| Sep | 2019 |
Richard Spilde - State of Digital Privacy |
| Apr | 2019 |
Marios Diamedes and John Russo - Robotics Process Automation (RPA) andArtificial Intelligence (AI):A New World Order (slides show LA Chapter from 2018, but this is same deck as presented at Denver AGM) |
| Mar | 2018 |
Lanny Morrow - Forensic Analytics |
| Oct | 2017 |
T Ridpath - ISACA Presentation |
| Oct | 2017 |
I Bramson - Business At the Speed of Cyber
|
| Sep | 2017 |
J Jones, FAIR Institute - Modern Cyber & Technology Risk Measurement |
| Sep | 2017 |
J Jones, FAIR Institute - Controls Chapter |
| Apr | 2017 |
T Baccam - Auditing Web and Mobile Applications |
| Mar | 2017 |
J Hare - Current SOX Trends |
| Mar | 2017 |
J Hare - Decryption of Credit Card and Bank Data Risks and Controls v3 |
| Mar | 2017 |
J Hare - ERP Risk Advisors The One Profile Option that Could Undermine Your Journal Entry Controls |
| Mar | 2017 |
J Hare - ERP Risk Advisors The One Function that Could Undermine Your Journal Entry Controls |
| Mar | 2017 |
J Hare - ERP Risk Advisors The One Configuration that Could Undermine Your Journal Entry Controls |
| Mar | 2017 |
J Hare - Change Management Best Practices for Oracle E-Business Suite |
| Mar | 2017 |
J Hare - Best Practices in Application Security Design for Oracle E-Business Suite |
| Jan | 2017 |
R Clyde - ISACA Int'l Update and Safely Embracing the Cyber Future |
| Nov | 2016 |
J Trull - Threat Detection and IR |
| Nov | 2016 |
J Plucienkowski - Threat Detection and IR |
| Nov | 2016 |
A Anderson - Threat Detection and IR |
| Nov | 2016 |
R Lazarony - Threat Detection and IR |
| Oct | 2016 |
Securing Privileged Access - SecureWorld |
| Apr | 2016 |
AGM Presentation |
| Jan | 2016 |
SQL Server Security Audit |
| Jan | 2016 |
SQL Server Security Audit - slide notes |
| Jan | 2016 |
SQL Server Audit Scripts (offered as is; no warranty implied) |
| Dec | 2015 |
Building & Evolving a Cyber Security Program |
| Nov | 2015 |
Balancing Compliance & Security |
| Oct | 2015 |
Understanding SOC Reports |
| Sep | 2015 |
Emerging Issues in IT Auditing |
| Sep | 2015 |
Securing It All |
| Sep | 2015 |
Using Service Supportability |
| Apr | 2015 |
Privacy Trends (Corp Outreach Rndtble) |
| Apr | 2015 |
Breach Response (Corp Outreach Rndtble) |
| Apr | 2015 |
NIST Cyber Security Framework |
| Apr | 2015 |
Insider Threat Report |
| Apr | 2015 |
AGM Presentation |
| Mar | 2015 |
Data Analytics-A Practical Approach |
| Feb | 2015 |
Collaboration and Communication |
| Jan | 2015 |
Automating Controls |
| Dec | 2014 |
Evolving Role of the CISO |
| Nov | 2014 |
SOC2 Report Updates |
| Oct | 2014 |
Oracle Audit and Security |
| Sep | 2014 |
Auditing Windows and Unix |
| Feb | 2014 |
Security Metrics that Matter |
| Dec | 2013 |
PCI DSS 3.0 The Good, The Bad, The Confusing |
| Oct | 2013 |
HIPAA ISACA Presentation |
| Apr | 2013 |
CoBIT 5.0 Overview |
| Mar | 2013 |
IT Risk Management and GRC Tech Enablement |
| Jan | 2013 |
End User Computing: Risks of Convenience |
| Oct | 2012 |
SOC 2 Breakout from October Meeting |
| Sep | 2012 |
Managing Info Sec Risk in Dist and Dynamic Business |
| Apr | 2012 |
Defending the United States in the Digital Age |
| Feb | 2012 |
Mobile Security |
| Jan | 2012 |
Beyond Compliance, Design Assessment |
| Dec | 2011 |
Trusted Cloud & VMware, VMware Vision |
| Sep | 2011 |
XBRL |
| May | 2011 |
If I Wake Up Evil |
| Apr | 2011 |
Retirement of SAS 70 |
| Mar | 2011 |
Web Application Security |
| Dec | 2010 |
Data Loss Prevention |
| Nov | 2010 |
Cloud Computing Security |
| Oct | 2010 |
IT Blind Side |
| Sep | 2010 |
Advanced Persistent Threats |
| Feb | 2010 |
Secure the Coding |
| Jan | 2010 |
Cloud Security |
| Oct | 2009 |
Strategies for Managing Risk |
| Sep | 2009 |
Database Security & Auditing |
| Apr | 2009 |
PCI Stds, Updates and Trends |
| Mar | 2009 |
GAPP Overview and Uses |
| Feb | 2009 |
Enterprise Computing in the Open Network |
| Jan | 2009 |
Bot Network Risks and Strategies |
| Nov | 2008 |
Red Flag Rules |
| Sep | 2008 |
How to Engineer an Effective Access Review Program |
| May | 2008 |
Foundational Controls |
| Mar | 2008 |
High Value IT Auditing |
| Feb | 2008 |
Application-Level IT Risk Assessment |
| Sep | 2006 |
Email Governance, Compliance, and Archiving |
| Apr | 2006 |
Document Retention Policies |
| Apr | 2005 |
Incident Response and Digital Forensics |
| Sep | 2004 |
ISACA Sarbanes-Oxley |
| May | 2004 |
Securing & Auditing Cisco Routers |
| Apr | 2003 |
Creating, Using, & Justifying the Auditor's Toolkit Part 1 |
| Apr | 2003 |
Creating, Using, & Justifying the Auditor's Toolkit Part 2 |
| Feb | 2003 |
FBI Cyber Investigations |
| Feb | 2003 |
FBI Cyber Squad |
| Nov | 2002 |
Checkpoint Firewall |
| Oct | 2002 |
Oracel Database Q&A |
| Mar | 2002 |
Impact of P3P |
| Feb | 2002 |
Incident Response and Forensic Planning |
| Nov | 2001 |
Self Hack Audit |
| Oct | 2001 |
IT Assurance and Reliability |
| Jan | 2001 |
Virtual Private Network |
| Feb | 2000 |
CMM |